ComputerWeekly.com Research Library

Powered by Bitpipe.com

Web Application Security Research

  • Top 10 North American Bank Eliminates Credential Stuffing

    Sponsored by: Shape Security

    A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.

  • Airline Stops Automated Attacks on Web & Mobile

    Sponsored by: Shape Security

    A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.

  • Q2, 2019 Cyberthreats & Trends Report

    Sponsored by: Neustar

    While DDoS attacks have long been considered unsophisticated threats that are designed to block network pipes to the targets, these incursions have become much more strategic. In this report, learn how to defend against and prepare for these kinds of small sophisticated threats.

  • Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up

    Sponsored by: Proofpoint

    Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.

  • Online Retail Threats Credential Stuffing

    Sponsored by: Shape Security

    In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.

  • The Threat of Online Skimming to Payment Security

    Sponsored by: Tala Security

    The emerging threat of online skimming presents a great threat to the payment security industry. In this blog, explore basic questions with PCI SSC Chief Technology Officer Troy Leach about a newly released bulletin by the PCI SSC on the topic of digital skimming and how to detect and prevent this dangerous threat.

  • Supplementing the Limitations in Office 365

    Sponsored by: Forcepoint

    This Osterman Research report explores how you can use the native capabilities Office 365 provides as a starting point for your data protection strategy, and how you can implement a 3rd party service to help ensure all of your data is backed-up and recoverable.

  • Magecart PCI Advisory on CSP

    Sponsored by: Tala Security

    The Payment Card Industry Security Standard Council issued a set of recommendations and guidance to address the growing threat by magecart. They suggested using Content Security Policies (CSP) to restrict compliant browsers from executing JavaScript from source which have not been explicitly whitelisted. In this blog, learn more about CSP.

  • 10 Questions to Ask About Your Office 365 Deployment

    Sponsored by: Mimecast

    Providing robust email security is a critical best practice for any organization in an era of increasingly sophisticated email-borne attacks. While Office 365 provides some native protections, there are limitations to consider. In this research report, explore key issues to consider when evaluating the email security capabilities of Office 365.

  • How to solve DNS security issues in your organization

    Sponsored by: TechTarget

    The urgency to implement DDoS protection has never been higher. Without better protection, brand damage, revenue loss and hefty fines can occur. In fact, according to Neustar's Q1 2019 Threats & Trends Report, there has been a 200% increase in the number of DDoS attacks comparing Q1, 2019 to Q1, 2018.

  • Mimecast Cyber Resilience For Email

    Sponsored by: Mimecast

    Listen as Joel Bedoford and Phillip Clark from Mimecast explore the current cyber resilience landscape for Australian businesses and unpack survey results from 257 IT decisions makers on the topic of Cyber Resilience for Email.

  • A Quick Guide to Stopping Ransomware

    Sponsored by: Webroot

    In this infographic, explore 9 proactive steps you can take to reduce the likelihood that you'll fall victim to a crypto-ransomware attack.

  • 6 Steps to Container Security

    Sponsored by: Trend Micro, Inc.

    Container security is challenging, as it covers so many aspects of the development process and supporting infrastructure. The overall strategy can be simply put as "secure outside in". In this white paper, discover 6 steps to implementing the "secure outside in" approach.

  • Move off Oracle and onto Amazon Web Services (AWS) with clckwrk

    Sponsored by: AWS & RDX

    In this webcast, tap into a comparison between Oracle and AWS databases to see how each vendor measures up.

  • Is DNS Filtering the Best Cybersecurity Technology You're Not Using?

    Sponsored by: Neustar

    A new IDG Research study found that many IT decision-makers are overlooking an inexpensive technology that may already be in their arsenal: DNS filtering. In this IDG Quick Poll, explore security benefits that DNS filtering can provide and how to use it to its full potential.

  • Protecting Your IT Assets from Cryptomining Malware

    Sponsored by: Neustar

    Cryptomining malware has exploded on the threat landscape, becoming one of the most common malware attacks and posing a significant risk to your IT assets. In this white paper learn everything you need to know about cryptomining including what it does, how it gets in, and how to recognize and prevent it.

  • This is the #1 Threat to Your Digital Properties

    Sponsored by: The Media Trust

    In the early days of the Web and e-commerce, CISOs could secure the web application code developed by internal teams. But now, the majority of a website's code relies on third-parties. In this white paper, learn what CISOs need to know in order to protect themselves and their digital properties from malicious third-party code.

  • Select the Right Strategy for Securing Web Access

    Sponsored by: Menlo Security

    In this Gartner Market Analysis, discover how to select the right strategy for securing web access with 7 major security goals.

  • Zero Trust Internet Is the Answer for 100% Email and Web Security

    Sponsored by: Menlo Security

    Today's products categorize Internet content as being either malicious or safe and this approach is known to fail. Internet isolation enables the Zero Trust Internet and takes the guesswork out of security by assuming that all Internet content is malicious. In this white paper, learn more about Internet Isolation and Zero Trust Internet.

  • How Internet Isolation Eliminates Threats That Evade Sandboxes

    Sponsored by: Menlo Security

    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.

  • Build a Strategic Approach to Network and App Security

    Sponsored by: Citrix

    In this e-book, discover how an integrated, intelligent approach to security can help you deliver the access, control, and security you need.

  • 10 Myths in Selecting a Web Application Firewall

    Sponsored by: Akamai

    Securing your web applications can be a daunting task. However, a web application firewall (WAF) can help keep threats at bay while preserving application performance. The challenge is choosing the right WAF. This white paper dispels 10 WAF myths that will help you evaluate what matter most when choosing a WAF.

  • Malware: The Ubiquitous Menace

    Sponsored by: The Media Trust

    Every day seems to bring news of web-based malware attacking another popular, highly trafficked website, causing harm to visitors and tarnishing the site owner's reputation and bottom line. In this white paper, learn how IT and SOC managers can protect their customers and employees by addressing security gaps on the front-end of their website.

  • 5 Signs of Malicious Activity Your Organization May Be Overlooking

    Sponsored by: Farsight Security

    If given even the smallest window of opportunity, cybercriminals will exploit any Internet service or infrastructure to support their campaigns. Security and IT admins play critical roles in monitoring networks for indicators of malicious activity. In this infographic, explore 5 signs of malicious activity your organization may be overlooking.

  • 6 Security Facts that Organizations aren't Considering

    Sponsored by: The Media Trust

    In this white paper, discover the 6 security facts that you should start considering to make your websites more secure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.